Bug 1791225 (CVE-2019-17023)

Summary: CVE-2019-17023 nss: TLS 1.3 HelloRetryRequest downgrade request sets client into invalid state
Product: [Other] Security Response Reporter: Huzaifa S. Sidhpurwala <huzaifas>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: crypto-team, dueno, elio.maldonado.batiz, kdudka, kengert, nss-nspr-maint, sdunne, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: nss 3.49 Doc Type: If docs needed, set a value
Doc Text:
A protocol downgrade flaw was found in Network Security Services (NSS). After a HelloRetryRequest has been sent, the client may negotiate a lower protocol than TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored.
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-08-03 13:27:50 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1791228, 1791229    
Bug Blocks: 1790871    

Description Huzaifa S. Sidhpurwala 2020-01-15 09:25:50 UTC
As per upstream:

After a HelloRetryRequest has been sent, the client may negotiate a lower protocol that TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored.

Upstream bug: https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2019-17023 (currently private)

Comment 1 Huzaifa S. Sidhpurwala 2020-01-15 09:25:54 UTC
External References:

https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.49_release_notes

Comment 2 Huzaifa S. Sidhpurwala 2020-01-21 10:12:14 UTC
Statement:

This flaw causes the client to hang when there is a downgrade attempt. Therefore no actual protocol downgrade occurs.

Comment 5 errata-xmlrpc 2020-08-03 13:01:25 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:3280 https://access.redhat.com/errata/RHSA-2020:3280

Comment 6 Product Security DevOps Team 2020-08-03 13:27:50 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-17023

Comment 10 errata-xmlrpc 2020-09-29 20:58:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2020:4076 https://access.redhat.com/errata/RHSA-2020:4076